Followers

Showing posts with label Software. Show all posts
Showing posts with label Software. Show all posts

Z TECH V 5 Machines Absentee Best and Economical

Z TECH V 5 Machines Absentee Best and Economical to use the sensor crystal (scratch resistant, anti-generation smoking) and using the sensor bio + (body temperature, blood flow and fingerprints) and equipped with a local software that makes the machine easier to use even by those who have never operated a computer. software used is customized and Indonesia following the standard suitable for companies or agencies that use strict rules. can also be used for multi-shift system.

Z TECH V 5 Mesin Absen Terbaik dan Ekonomis
Features Z TECH V 5 Best Machines Absentee and Economical:

1. Comparison of methods: 1:1 or 1: N
2. Sensor: Optical Crystal, 20x16mm
3. User Capacity: 3000 user
4. Transaction storage: 80,000 records
5. Identification speed inputs: less than 1 second
6. FAR (the error rate of identification): 0.0001%
7. FAR (rejection rate): 0.01%
8. Identification Method: Finger / ID + password
9. Communications: TCP-IP / stand alone
10. Language choice: Indonesia / English
11. Power consumption: 220V 50Hz, 5 Watt
12. Environment that encouraged
a. humidity: 20-80%
b. temperature: 0 -4 Celsius
13. Size / Weight: 190x138x55 mm / 1.5 kg
14. Shutsown: Automatic
15. Access control: support
16. Battery backup: Optional
17. Network capacity: 255 sets
18. Computer OS: Windows 98/2000/XP
19. Database: Access / SQL Server 2000
20. Export: Excel, txt
21. Option: Alarm
22. Suitable unruk: offices, hotels, factories, villas, banks, government agencies, etc.

Z TECH V 5 Best and Economical Absent Machine you can make as an alternative to one of the main engine or absent at the agency office.

By utilizing this attendance machine then there are several advantages gained by the company or agency users, namely:
1. Effectiveness of employee attendance can be improved, because the employees are not present can not be represented by another employee. If anyone tries to represent will be rejected by the engine due to filter attendance bio sensors (temperature, blood flow and fingerprints)
2. Easy report generation, both in daily reports, weekly reports, monthly and annual reports. because the employee attendance data stored in digital form in memory attendance machine, which can be exported into text or excel format to facilitate querying, filtering, sorting or analysis of the effectiveness of employees.
3. It saves money, because you no longer need paper and ink for daily attendance. and administrative personnel are not required a lot of yng handle employee absences
4. Employee absences shorter time, so time for more productive activities.

Weaknesses:
1. Additional costs required for system maintenance and backup system periodically
2. Because attendance machine is made of electronic devices it will have a lifetime of effective, so that if the components have expired, should be held rejuvenation.
15:43 | 1 comments | Read More

Computer specs for internet cafe

Computer specs for internet cafe, This morning I want to share about your computer specs for the cafe and not just his computer spec will be but how do we sold the cafe and the best of the best in its region.
The first specification for a computer server, usually divided into the first two billing servers and server network bandwidth managament.


for its spec:

Computer hardware specifications for the Billing System Server:
Intel Dual Core processor (2.6 Ghz) TRAY
Motherboard ASUS / Gigabyte / ECS
V-gene DDR2 Memory 2 GB
80 Gb Hard Drive Seagate / Maxtor / Samsung SATA
Keyboard + Mouse Simbadda
Casing 450W ATX CPU FAN + 2
LCD Monitor LG / Samsung Wide Screen 17 "
Samsung DVD-RW

Mikrotik OS:
Intel Pentium 4 processor (2.4 Ghz) TRAY
Motherboard ASUS / Gigabyte / ECS
V-gene DDR2 1 Gb
Hard Drive Seagate / Maxtor 40Gb IDE Type
Casing 450W ATX CPU FAN + 2
Ethernet / LAN Card additional 1 piece
License Mikrotik Level 4

Spec Computer Games Online

The following computer hardware specifications online gaming cafe recommendation from me.

Client Computer hardware specifications:
Dual Core (2.5 GHz) TRAY
Motherboard ASUS / Gigabyte / ECS Memory DDR2 V-gene 2 Gb PC 5300
Hard Drive 160 Gb Seagate / Maxtor SATA
Keyboard + Mouse Simbadda
Casing 450W ATX CPU FAN + 2
LCD Monitor LG / Samsung Wide Screen 17 "
PCI-Express VGA Digital Alliance 9500GT Super 1GB DDR2 256bit

Non-Spec Computer Game

Several kinds of computer packages cafe and recommendations from my computer spec.

Client Computer hardware specification Type A:
Intel P4 processor (2.4 GHz) TRAY
Motherboard ASUS / Gigabyte / ECS
V-gene DDR2 1 Gb
Hard Drive 160 Gb Seagate / Maxtor / Samsung SATA / IDE
Advance Keyboard + Mouse
E-Case ATX Casing
LG Wide Screen LCD Monitor 17 "

Client Computer hardware specification Type B:
Intel P4 processor (2.8 Ghz) TRAY
Motherboard ASUS / Gigabyte / ECS
V-gene DDR2 1 Gb
Hard Drive 160 Gb Seagate / Maxtor / Samsung SATA / IDE
Keyboard + Mouse Simbadda
Casing Simbadda Sim-X 450W
LG Wide Screen LCD Monitor 17 "

For tips cafe that sold well then we should add some features:
- The existence of small mosque
- Cold drinks, snacks
- Toilet

Internet cafes should also provide services such as:
- Printer
- Scanner
- Print photo
- And many others.


Hopefully what I could be useful to inform all my friends.
15:26 | 1 comments | Read More

Does Fiber Optics That ?

Does Fiber Optics That ?, Fiber optic cables are composed of a thin optical glass as thick as a human hair that carry digital information in a very far distance. Also used in the medical-imaging, inspection and mechanical engineering.


Fiber optics (optical fibers), a thin glass layer as thick as the diameter of human hair. In a collection called optical cables and used to send signals over long distances

If we observe closely an optical fiber, we will see the following sections:
* Core - Glass thin, the center of the fiber where the light will pass
* Cladding - Outer optical material surrounding the core that reflects light back into the core
* Buffer coating - Plastic coating that protects the fiber from damage and moisture

Hundreds or thousands of optical fibers can be arranged in the collection of optical cable. Collection is protected by a cable from the outer covering, called a jacket.

Fiber optics comes in two types:

* Single-mode fiber
* Multi-mode fiber

Single mode fibers have small cores (about 3.5 x 10-4 inches or 9 microns in diameter) and transmit infrared laser light (wavelength = 1300 to 1550 nanometers). Multi-mode fibers have larger cores (about 2.5 x 10-3 inches or 62.5 microns in diameter) and transmit infrared light (wavelength = 850-1300 nm) of the LED lights.

Some optical fibers can be made from plastic. These fibers have a large core (0.04 inches or 1 mm in diameter) and transmit visible red light (wavelength = 650 nm) from LEDs
15:01 | 0 comments | Read More

Advantages Blackberry

Advantages Blackberry, BlackBerry Messenger bisa menjadi aset, jika anda ingin bertukar pesan dengan pengguna Blackberry lainnya. Dengan Blackberry, Anda dapat:
- Percakapan real-time dengan teman dan kolega di beberapa lokasi - atau melakukan beberapa percakapan sekaligus.
- Chat dengan grup.
- Mengirim dan menerima pesan dari nomor tak terbatas di seluruh dunia secara gratis tanpa biaya per pesan.
- Dapat menerima pesan tanpa memenuhi kotak masuk / inbox anda.
- Tahu apakah teman yang online, ada atau sibuk.
- Memungkinkan rekan anda mengetahui status anda untuk instant messaging
- Mengelola log-in dan kontak seperti yang Anda lakukan jika Anda menggunakan sebuah massenger dari PC anda.
- Terus menggunakan program lain dan mengirim dan menerima e-mail ketika Messenger BlackBerry sedang berjalan.
- Nada dering yang berbeda jika pesan datang dari orang yang berbeda pula.
14:59 | 0 comments | Read More

Blackberry Service

Blackberry Service, Mobile (Mobile) Blackberry (BB) will do no good if we do not subscribe to the package from your Blackberry. You could say without service BB, BB same henpon wrote henpon usual.

Blackberry mobile phones to access the Internet with APN: blackberry.net, where the setting is a built-in HP BB or on the BlackBerry Connect software ... I can not using that in the usual with HP playing GPRS APN settings as usual. Access to APN blackberry.net this is what we have to pay per month to operators around 185rb - 200rb.

While access to email / Blackberry email account was not anything to do with payment per month to the operator td. Blackberry account can we make if we have a handset / henpon Blackberry. And the rule of "common" ... him. 1 henpon have an account. So do HP-to-account ... it's up mo pake any operator.

In every HP Blackberry, we must know the PIN and IMEI it. PIN PIN here is not to enable the HP, but more like the second IMEI from HP. BB PIN is the identity of the BB handset, which enables chatting PIN-to-PIN.

Well for BB account creation, we can just go to sites like:
- Xl.blackberry.com
- Telkomsel.blackberry.com
- Indosat.blackberry.com

Actually it's up mo aja pake which, together wrote ... because it's to RIM its server. It's just better ngikutin operator is used. At the time of registration, will be prompted for the PIN and IMEI of the handset BB ours. Well, for example, will replace the handset kl ... must go into this account once en select Change Device, we must enter the PIN en ama new BB IMEI.
Kl no, the owner of the new BB handset never be able to register an account to your Blackberry (RIM).

For you who want to buy BB, first prepare the card / SIM card is already ready yng BB service.
So fitting a new BB handset purchase, immediately tried to registered BB account, because some cases ... a lot of who I alamin BB handset also still nggantung alias already registered ama others. Kl its case gini, complicated affairs ... practically ampir can not "dibenerin" ... unless we ask for the account owner TSB ngelepas his BB PIN.

Tp if sempet ngalamin, take a look at doing a hard reset once the BB ... sometimes its BB msh o'on rada ... how hardresetnya: Options - Security Options - General Settings - (click on the Menu) - Wipe Handheld. Quote msh nggantung Cl, yes deh already

BB handset testing process:
1. Prepare your SIM Card that is ready BB service
2. Insert the SIM card into the BB handset, turn on, and do the registration process service BB
3. If you need to restart the BB first (ALT - CAP - DEL)
4. Note the indicator paper GPRS / EDGE ... from small letters (gprs), later turned into big letters (GPRS). This marks the BB services from operators already active.
5. Go to Options - Advanced Options - Host Routing Table
There should be a few lines of text in there, kl is empty ... click Menu - Register Now
Wait until several lines in the Host Routing Table
6. Open a web browser on a PC, and enter the site BB
- Xl.blackberry.com
- Telkomsel.blackberry.com
- Indosat.blackberry.com
Select the appropriate operator SIM Card.
7. Open in BB, Options - Status, catet en IMEI PIN
8. Register new account on the site en IMEI PIN BB with the handset.
9. If successful, I'll live email account settings BB wrote on the site.
10. Email Settings enough from BB site, do not need the handset lg.

've Deh, until BB already be using that here ...
14:53 | 0 comments | Read More

Prohibited Uses Phone While Charging

Prohibited Uses Phone While Charging, Dangers of using phones while Charging (nge-cas) READ IMMEDIATELY, DO NOT YOU Mudah2an SIMILAR THING! Do not charge your phone overnight and DO NOT charge when placed near your Never answer an incoming call to HP when you're in charge! A few days ago, a laki2 HP was charging at her home. At the same time, a call came and he answered when HP is still connected to the electrical contacts. After a few seconds, electric current is not stable at home, and electric current (or better known over-volt voltage panic) goes to HP without control and the young man was thrown to the floor loudly. His parents rushed to his room and found him unconscious, with a weak heartbeat and burnt fingers. He was rushed to the hospital nearby, but his soul was beyond help when it comes to the hospital. HP is a very useful modern invention. But, we must berhati2 because HP could be the cause of death. Never use HP when still connected to electrical contacts!
14:52 | 0 comments | Read More

Strange Things In Microsoft

Strange Things In Microsoft :

first
You will not be able to create a folder with the name CON. Want in MyDocument, in Mypicture, In flash ato wherever, you will be able to make ga folder with the name CON (deh kalo ga tau candidate ngecrack) ga believe? just try ..!!!


second
Try to open your notepad, please write the words "Bush hid the facts" (do not save the mark pake ya), save where it abis wrote, with the name of any kind. if already open again the file was, Hayo writing so what?
Confused yes? same dunk

third
Well here it is ya that I was looking for, it turns out the words which must be just a little on the type duank. Dah deh, please on just try, open MS.Word her, kept writing "= rand (100, 99) '(save the mark should not be written too well) and then press enter.


Hehehe ... weird right? reportedly does, its creator himself can not explain why this happens.
14:51 | 0 comments | Read More

Preventing the spread of virus Flashdisk

Preventing the spread of virus Flashdisk, Viruses today are generally spread through two ways, online (via network) and offline (via physical storage media). To conduct the infection from one computer to another computer offline, the virus will take advantage of storage that is easy to carry. Maybe once the floppy is the most widely used media, but now appears to connect a USB flash disk. With greater capacity and the price is getting cheaper, the storage media is increasingly loved by many people.


Along with the increasingly widespread use of flash disks offline mechanisms of spread of the virus with the higher intensity as well particularly in Indonesia. The virus from domestic makers increasingly creative in designing the virus with certain tricks to speed up the spread of the virus that they make.

At first the virus will only put the file is a virus program to storage, so each time you connect your flash disk to a computer that is infected, the virus will place a folder / file to the flash disk virus without known owner. This trick is slowly becoming easier to detect and suspicious files it will easily be removed by the owner directly.

Then came the name of social engineering techniques (social engineering) in which the virus is inserted into the flash disk becomes more difficult to recognize by mimicking / create files and folders with pre-existing and hide the original file or by creating a file or folder with the name- name of the user's attention, it was all done with the expectation that the user clicks on the file / folder so that the virus can be active and get into the victim's computer.

Way of spreading a virus that is currently booming is to utilize existing Autorun feature in Windows operating systems. This feature greatly facilitates us who actually want to directly open / play files in the storage media immediately. But the virus makers see this feature as the fastest way to help spread the virus. By instilling virus with autorun.inf file is written to run a virus file in the root directory of the flash disk, every time a user connects to a computer flash drive autorun feature her active, the virus will automatically be run directly.

To perform virus prevention Autorun feature to spread with the help of now you do not have to bother anymore, as do the steps are long and risky settings. Thanks to portable applications from PandaSecurity security company, you are able to do security to connect USB storage, such as Flash Disk in a few clicks.

Free application called Panda USB Vaccine has two ways to counteract the spread of the virus through storage media:

1. Computer Vaccination - this application will disable the autorun feature of Windows computer operating system as a whole, so the program / virus that uses autorun.inf file and is in a USB / CD / DVD will not be executed / executed automatically. But you can still restore these features to its original state.
2. USB Drive Vaccination - Virus now can no longer create the file autorun.inf to help its spread. This application will make a special AUTORUN.INF file into the flash disk, where the file is already designed so as not to be changed, edited, or deleted by the virus. Users also can not delete the file except by doing format.

For the current vaccination facilities on the USB device only applies to storage format FAT & FAT32, but in the future this application will be developed to support the NTFS format.

These applications can run on Windows 2000 SP4 operating system, Windows XP SP1-SP3, and Windows Vista SP0 and SP1.
Before the emergence of this application I have long found some way of preventing the spread of viruses via USB in a way that is almost similar.
14:47 | 0 comments | Read More

SPEED SURF, The Surfing Speed ​​Estimator

SPEED SURF, The Surfing Speed ​​Estimator, When we subscribe to an ISP (Internet Service Provider), we will surely get the width of a certain bandwidth. For dial-up is usually the maximum speed is 56 Kbps. Internet 6Mbps cable and fiber optics typically 50-30 Mbps. But what these things mean?

If you're downloading large files, high bandwidth Generally translates into faster file download speeds. But keep in mind, a file download also relies on the site that's serving the file to you. If the site has a small pipe (limited bandwidth) or it's overloaded with users, you're Unlikely to see the speed That your provider touts in its brochure.

That's Why We developed SurfSpeed​​, and we're giving it to you for free. SurfSpeed ​​measures your web browsing speed and Gives you a number That you can compare to other SurfSpeed ​​users. SurfSpeed ​​is NOT a bandwidth meter; it's a real-world surfing speedometer.
14:45 | 0 comments | Read More